Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for checking and updating the ownership of outsourced data based on alliance chain

A technology for outsourcing data and data owners, applied in the field of information security, to resist tampering attacks, avoid low scalability, and eliminate mutual distrust

Active Publication Date: 2021-09-24
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the related protocols are still in the early stage of research, and issues such as efficient auditing of data, system scalability, and unified management of transactions are still urgent challenges to be dealt with.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for checking and updating the ownership of outsourced data based on alliance chain
  • A method for checking and updating the ownership of outsourced data based on alliance chain
  • A method for checking and updating the ownership of outsourced data based on alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention is further described below in conjunction with the accompanying drawings and embodiments.

[0042] This embodiment provides ownership check and update the program data based on the league outsourcing chain, such as its program flowchart figure 1 As shown in Class 4 stakeholders: the data owner, service node, auditors, block creator;

[0043] The flowchart figure 2 , Includes seven algorithm:

[0044] initialization:

[0045] Selecting a secure hash function h according to the security parameters, data owner run the initialization algorithm: {0,1} * → G, a bilinear map e: G × G → G T , Two pseudo-random function with A random number as a private key s random numbers α 1 α 2 , ..., α s ∈G, calculates secret key sk and the corresponding public key pk = g sk ∈G, wherein, G, G T Are group, q is the order of G, g is a member of the G of the green, Q is a cyclic group of order.

[0046] Label generation:

[0047] Running the data owner tag generation algo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for checking and updating ownership of outsourced data based on alliance chains, including initialization, label generation, challenge, proof generation, verification, update request and update steps, and adopts a homomorphic hash function to realize outsourced data Tag generation and ownership check, introduce transaction (Transaction, TX) to record modification operations to support dynamic update of data, use alliance chain technology and delegated proof of stake (DPoS mechanism) to centrally manage the operation records of various stakeholders in the scheme . Compared with existing outsourced data ownership check or update schemes, the execution process and data management of the method in the present invention have high transparency, can eliminate distrust among stakeholders, and can resist tampering attacks on outsourced data; At the same time, it can strike a good balance between the efficient auditing of data and the scalability of data management.

Description

Technical field [0001] The present invention relates to information security technology. Background technique [0002] Cloud computing is the next generation of information technology infrastructure is widely accepted and used in various fields. Through the organization and management of a large number of peer nodes, the cloud has a huge computing power and distributed disk space. Even so, safely and effectively balance "growing user demand for storage" and "not entirely credible supply of disk space" for cloud platforms remains a daunting challenge. From a theoretical point of view, the existing ad hoc outsourcing deals (peer-to-peer outsourcingtrading, POT) scheme can meet the user to a certain extent on the storage space requirements (in terms of capacity and safety), but there are still safety issues and lack of features, such as multi-party participation in the unified management, updating distributed data outsourcing and other issues. [0003] For individual users, in order...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06F16/27G06F16/23
CPCH04L63/123H04L9/3236G06F16/23G06F16/27H04L9/50
Inventor 许春香薛婧婷李闪闪
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA